ISSTA '94 Proceedings of the 1994 ACM SIGSOFT international symposium on Software testing and analysis
A linear iteration time layout algorithm for visualising high-dimensional data
Proceedings of the 7th conference on Visualization '96
Color Theory and Modeling for Computer Graphics, Visualization, and Multimedia Applications
Color Theory and Modeling for Computer Graphics, Visualization, and Multimedia Applications
Self-Organizing Maps
IVEE: an Information Visualization and Exploration Environment
INFOVIS '95 Proceedings of the 1995 IEEE Symposium on Information Visualization
Domesticating Bead: adapting an information visualization system to a financial institution
INFOVIS '97 Proceedings of the 1997 IEEE Symposium on Information Visualization (InfoVis '97)
Visualizing Huge Tracefiles with Xscal
LISA '96 Proceedings of the 10th USENIX conference on System administration
Using Visualization in System and Network Administration
LISA '96 Proceedings of the 10th USENIX conference on System administration
Parallel Coordinates: Visual Multidimensional Geometry and Its Applications
Parallel Coordinates: Visual Multidimensional Geometry and Its Applications
Intrusion detection using sequences of system calls
Journal of Computer Security
A New Architecture for Managing Enterprise Log Data
LISA '02 Proceedings of the 16th USENIX conference on System administration
Discriminating and visualizing anomalies using negative selection and self-organizing maps
GECCO '05 Proceedings of the 7th annual conference on Genetic and evolutionary computation
A new intrusion detection system using support vector machines and hierarchical clustering
The VLDB Journal — The International Journal on Very Large Data Bases
ICCBR '07 Proceedings of the 7th international conference on Case-Based Reasoning: Case-Based Reasoning Research and Development
Visualizing Real-Time Network Resource Usage
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Graph Drawing for Security Visualization
Graph Drawing
Visual and algorithmic tooling for system trace analysis: a case study
ACM SIGOPS Operating Systems Review
Interactive visualization for network and port scan detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
System log summarization via semi-Markov models of inter-arrival times
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
A novel approach to visualize web anomaly attacks in pervasive computing environment
The Journal of Supercomputing
PREC: practical root exploit containment for android devices
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |